A survey of distributed consensus protocols for blockchain networks Y Xiao, N Zhang, W Lou, YT Hou IEEE Communications Surveys & Tutorials 22 (2), 1432-1465, 2020 | 1005 | 2020 |
Privacyguard: Enforcing private data usage control with blockchain and attested off-chain contract execution Y Xiao, N Zhang, J Li, W Lou, YT Hou Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020 | 88 | 2020 |
Distributed consensus protocols and algorithms Y Xiao, N Zhang, J Li, W Lou, YT Hou Blockchain for Distributed Systems Security 25, 2019 | 88 | 2019 |
Manda: On adversarial example detection for network intrusion detection system N Wang, Y Chen, Y Xiao, Y Hu, W Lou, YT Hou IEEE Transactions on Dependable and Secure Computing 20 (2), 1139-1153, 2022 | 85 | 2022 |
Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work Blockchain Y Xiao, N Zhang, W Lou, YT Hou IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 1648-1657, 2020 | 52 | 2020 |
Flare: defending federated learning against model poisoning attacks via latent space representations N Wang, Y Xiao, Y Chen, Y Hu, W Lou, YT Hou Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 49 | 2022 |
Decentralized spectrum access system: Vision, challenges, and a blockchain solution Y Xiao, S Shi, W Lou, C Wang, X Li, N Zhang, YT Hou, JH Reed IEEE Wireless Communications 29 (1), 220-228, 2022 | 43 | 2022 |
Offloading decision in edge computing for continuous applications under uncertainty W Chang, Y Xiao, W Lou, G Shou IEEE Transactions on Wireless Communications 19 (9), 6196-6209, 2020 | 27 | 2020 |
CANShield: Deep Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal-Level MH Shahriar, Y Xiao, P Moriano, W Lou, YT Hou IEEE Internet of Things Journal, 2023 | 24* | 2023 |
Challenges and new directions in securing spectrum access systems S Shi, Y Xiao, W Lou, C Wang, X Li, YT Hou, JH Reed IEEE Internet of Things Journal 8 (8), 6498-6518, 2021 | 22 | 2021 |
Session key distribution made practical for CAN and CAN-FD message authentication Y Xiao, S Shi, N Zhang, W Lou, YT Hou Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | 20 | 2020 |
{ARI}: Attestation of Real-time Mission Execution Integrity J Wang, Y Wang, A Li, Y Xiao, R Zhang, W Lou, YT Hou, N Zhang 32nd USENIX Security Symposium (USENIX Security 23), 2761-2778, 2023 | 18 | 2023 |
SofitMix: A secure offchain-supported bitcoin-compatible mixing protocol H Xie, S Fei, Z Yan, Y Xiao IEEE Transactions on Dependable and Secure Computing 20 (5), 4311-4324, 2022 | 12 | 2022 |
Bijack: Breaking bitcoin network with tcp vulnerabilities S Li, S Shi, Y Xiao, C Zhang, YT Hou, W Lou European Symposium on Research in Computer Security, 306-326, 2023 | 10 | 2023 |
A decentralized truth discovery approach to the blockchain oracle problem Y Xiao, N Zhang, W Lou, YT Hou IEEE INFOCOM 2023-IEEE Conference on Computer Communications, 1-10, 2023 | 9 | 2023 |
Bd-sas: Enabling dynamic spectrum sharing in low-trust environment Y Xiao, S Shi, W Lou, C Wang, X Li, N Zhang, YT Hou, JH Reed IEEE Transactions on Cognitive Communications and Networking 9 (4), 842-856, 2023 | 9 | 2023 |
{UCBlocker}: Unwanted call blocking using anonymous authentication C Du, H Yu, Y Xiao, YT Hou, AD Keromytis, W Lou 32nd USENIX Security Symposium (USENIX Security 23), 445-462, 2023 | 7 | 2023 |
Ms-ptp: Protecting network timing from byzantine attacks S Shi, Y Xiao, C Du, MH Shahriar, A Li, N Zhang, YT Hou, W Lou Proceedings of the 16th ACM Conference on Security and Privacy in Wireless …, 2023 | 6 | 2023 |
Scale-mia: A scalable model inversion attack against secure federated learning via latent space reconstruction S Shi, N Wang, Y Xiao, C Zhang, Y Shi, YT Hou, W Lou arXiv preprint arXiv:2311.05808, 2023 | 5 | 2023 |
Mobile tracking in 5g and beyond networks: Problems, challenges, and new directions C Du, H Yu, Y Xiao, W Lou, C Wang, R Gazda, YT Hou 2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems …, 2022 | 4 | 2022 |